{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T16:17:11Z","timestamp":1725985031820},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319950976"},{"type":"electronic","value":"9783319950983"}],"license":[{"start":{"date-parts":[[2018,7,22]],"date-time":"2018-07-22T00:00:00Z","timestamp":1532217600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-319-95098-3_16","type":"book-chapter","created":{"date-parts":[[2018,7,21]],"date-time":"2018-07-21T10:22:26Z","timestamp":1532168546000},"page":"179-190","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Applying Network Analysis for Extracting Knowledge About Environment Changes from Heterogeneous Sensor Data Streams"],"prefix":"10.1007","author":[{"given":"Francesco","family":"Cauteruccio","sequence":"first","affiliation":[]},{"given":"Paolo","family":"Lo Giudice","sequence":"additional","affiliation":[]},{"given":"Giorgio","family":"Terracina","sequence":"additional","affiliation":[]},{"given":"Domenico","family":"Ursino","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,22]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Bosman, H., Liotta, A., Iacca, G., Wrtche, H.: Anomaly detection in sensor systems using lightweight machine learning. In: 2013 IEEE International Conference on Systems, Man, and Cybernetics, Manchester, pp. 7\u201313 (2013)","DOI":"10.1109\/SMC.2013.9"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Bosman, H., Liotta, A., Iacca, G., Wrtche, H.: Online extreme learning on fixed- point sensor networks. In: IEEE 13th International Conference on Data Mining Workshops (ICDMW), pp. 319\u2013326 (2013)","DOI":"10.1109\/ICDMW.2013.74"},{"issue":"2","key":"16_CR3","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/j.arcontrol.2008.03.008","volume":"32","author":"Y Zhang","year":"2008","unstructured":"Zhang, Y., Jiang, J.: Bibliographical review on reconfigurable fault-tolerant control systems. Ann. Rev. Control 32(2), 229\u2013252 (2008)","journal-title":"Ann. Rev. Control"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Ho, J.-W., et al.: Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks. Ad. Hoc Netw., 147688 (2009)","DOI":"10.1016\/j.adhoc.2009.04.008"},{"issue":"18","key":"16_CR5","doi-asserted-by":"publisher","first-page":"4324","DOI":"10.1016\/j.comcom.2008.06.020","volume":"31","author":"Guorui Li","year":"2008","unstructured":"Li, G. et al.: Group-based intrusion detection system in wireless sensor networks. Comput. Commun., 4324\u201332 (2008)","journal-title":"Computer Communications"},{"issue":"1112","key":"16_CR6","doi-asserted-by":"publisher","first-page":"2353","DOI":"10.1016\/j.comcom.2007.04.025","volume":"30","author":"ECH Ngai","year":"2007","unstructured":"Ngai, E.C.H., Liu, J., Lyu, M.R.: An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks. Comput. Commun. 30(1112), 2353\u20132364 (2007)","journal-title":"Comput. Commun."},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Yu, Z., Tsai, J.J.P.: A framework of machine learning based intrusion detection for wireless sensor networks. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2008), Taichung, pp. 272\u2013279 (2008)","DOI":"10.1109\/SUTC.2008.39"},{"key":"16_CR8","unstructured":"Curia, V., Tropea, M., Fazio, P., Marano, S.: Complex networks: Study and performance evaluation with hybrid model for Wireless Sensor Networks. In: Electrical and Computer Engineering (CCECE), 2014 IEEE 27th Canadian Conference, pp. 1\u20135. IEEE"},{"issue":"4","key":"16_CR9","doi-asserted-by":"publisher","first-page":"1210","DOI":"10.1016\/j.jnca.2011.06.001","volume":"35","author":"A Cuzzocrea","year":"2012","unstructured":"Cuzzocrea, A., Papadimitriou, A., Katsaros, D., Manolopoulos, Y.: Edge betweenness centrality: a novel algorithm for QoS-based topology control over wireless sensor networks. J. Netw. Comput. Appl. 35(4), 1210\u20131217 (2012)","journal-title":"J. Netw. Comput. Appl."},{"issue":"5","key":"16_CR10","doi-asserted-by":"publisher","first-page":"1605","DOI":"10.1007\/s11276-015-1054-5","volume":"22","author":"A Jain","year":"2016","unstructured":"Jain, A.: Betweenness centrality based connectivity aware routing algorithm for prolonging network lifetime in wireless sensor networks. Wirel. Netw. 22(5), 1605\u20131624 (2016)","journal-title":"Wirel. Netw."},{"issue":"4","key":"16_CR11","doi-asserted-by":"publisher","first-page":"1302","DOI":"10.1016\/j.jnca.2011.03.004","volume":"34","author":"Miao Xie","year":"2011","unstructured":"Xie, M., Han, S., Tian, B., Parvin, S.: Anomaly detection in wireless sensor networks: A survey. J. Netw. Comput. Appl. 34(4), 1302\u20131325 (2011)","journal-title":"Journal of Network and Computer Applications"},{"key":"16_CR12","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/978-3-642-11631-5_37","volume-title":"Next Generation Society. Technological and Legal Issues","author":"Alexis Papadimitriou","year":"2010","unstructured":"Papadimitriou, A., Katsaros, D., Manolopoulos, Y.: Social network analysis and its applications in wireless sensor and vehicular networks. International Conference on e-Democracy, pp. 411\u2013420. Springer, Berlin, Heidelberg"},{"issue":"1","key":"16_CR13","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.compbiomed.2016.07.015","volume":"77","author":"F Cauteruccio","year":"2016","unstructured":"Cauteruccio, F., Stamile, C., Terracina, G., Ursino, D., Sappey-Marinier, D.: An automated string-based approach to extracting and characterizing White Matter fiber-bundles. Comput. Biol. Med. 77(1), 64\u201375 (2016)","journal-title":"Comput. Biol. Med."},{"key":"16_CR14","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-31955-9_3","volume-title":"Network Analysis","author":"Dirk Kosch\u00fctzki","year":"2005","unstructured":"Kosch\u00fctzki, D., Lehmann, K.A, Peeters, L., Richter, S., Tenfelde-Podehl, D., Zlotowski, O.: Centrality indices. In: Network Analysis, pp. 16\u201361. Springer (2005)"},{"issue":"2012","key":"16_CR15","first-page":"1952","volume":"35","author":"G Fortino","year":"1934","unstructured":"Fortino, G., Guerrieri, A., OHare, G., Ruzzelli, A.: A flexible building management framework based on wireless sensor and actuator networks. J. Netw. Comput. Appl. 35(2012), 1952 (1934)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"16_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2529988","volume":"10","author":"Omprakash Gnawali","year":"2013","unstructured":"Gnawali, O., Fonseca, R., Jamieson, K., Kazandjieva, M., Moss, D., Levis, P.: CTP: an efficient, robust, and reliable collection tree protocol for wireless sensor networks. ACM Trans. Sens. Netw. 10(1) (2013) 16:116:49","journal-title":"ACM Transactions on Sensor Networks"},{"key":"16_CR17","unstructured":"Levis, P., Patel, N., Culler, D., Shenker, S.: Trickle: a self-regulating algorithm for code propagation and maintenance in wireless sensor networks. In: 1st Conference on Symposium on Networked Systems Design and Implementation - vol. 1. NSDI 04, Berkeley, CA, USA, USENIX Association (2004)"}],"container-title":["Smart Innovation, Systems and Technologies","Neural Advances in Processing Nonlinear Dynamic Signals"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-95098-3_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T04:06:24Z","timestamp":1571630784000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-95098-3_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,22]]},"ISBN":["9783319950976","9783319950983"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-95098-3_16","relation":{},"ISSN":["2190-3018","2190-3026"],"issn-type":[{"type":"print","value":"2190-3018"},{"type":"electronic","value":"2190-3026"}],"subject":[],"published":{"date-parts":[[2018,7,22]]}}}